A type of a Trojan horse
that is designed to provide the attacker with sensitive data
such as passwords
, credit card information, log files, e-mail address
contact lists. These Trojans can look for specific pre-defined data (e.g., just credit card information or passwords), or they could install a keylogger
and send all recorded keystrokes back to the attacker.
See also Trojan horse.